Enhancing Cybersecurity Resilience: A Comprehensive Analysis of Human Factors and Security Practices Aligned with the NIST Cybersecurity Framework
Although effective technical countermeasures play a pivotal role in safeguarding
organizations' digital assets, the persistent challenge of human factors in cybersecurity …
organizations' digital assets, the persistent challenge of human factors in cybersecurity …
NITRO: an Interconnected 5G-IoT Cyber Range
This paper presents NITRO cyber range, which aims at creating a specialized cybersecurity
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
Enhancing AI-Enabled Education Through Mobile Learning and Bring Your Own Device (BYOD) Integration
W Shafik - Exploring Youth Studies in the Age of AI, 2024 - igi-global.com
Recent technological developments influence different daily human activities, including
education and lifestyle. This chapter explores the significance of mobile learning and …
education and lifestyle. This chapter explores the significance of mobile learning and …
Use Your Own Device (UYOD): Framework for Building a Human Firewall
T Gundu, K Kativu - 2024 - digitalcommons.kennesaw.edu
ABSTRACT The Use Your Own Device (UYOD) paradigm is increasingly common in
modern digital workplaces, offering benefits like flexibility and cost savings but also …
modern digital workplaces, offering benefits like flexibility and cost savings but also …
Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance
A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …
cyber threats, has elevated the importance of robust cybersecurity measures. This …
[PDF][PDF] Cybersecurity Challenges and Pitfalls in 6G Networks
The transition from 5G to 6G networks aims to improve connection speeds and intelligence
levels. 6G is expected to support machine-type communications and ultra-reliable …
levels. 6G is expected to support machine-type communications and ultra-reliable …
Navigating the waters of maritime cybersecurity with BIMCO's guidelines: identifying vulnerabilities and mitigating threats to IT and OT systems
G Kalogeras - 2023 - dione.lib.unipi.gr
IT systems in vessels used in the marine sector, incorporating guidelines and methodologies
from BIMCO in the review process. This study comprises a review of possible cybersecurity …
from BIMCO in the review process. This study comprises a review of possible cybersecurity …